/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_nl80211_event.c | 173 event.auth.status_code = le_to_host16(mgmt->u.auth.status_code); 229 status = le_to_host16(mgmt->u.assoc_resp.status_code); 239 event.assoc_reject.status_code = status; 276 u16 status_code; local 290 status_code = status ? nla_get_u16(status) : WLAN_STATUS_SUCCESS; 295 status_code, drv->ignore_next_local_disconnect); 301 if (cmd == NL80211_CMD_CONNECT && status_code != WLAN_STATUS_SUCCESS) { 324 event.assoc_reject.status_code = status_code; [all...] |
H A D | driver.h | 2852 * @status_code: Status Code or Reason Code to use (if needed) 2863 u8 dialog_token, u16 status_code, u32 peer_capab, 4373 u16 status_code; member in struct:wpa_event_data::auth_info 4406 * status_code - Status Code from (Re)association Response 4408 u16 status_code; member in struct:wpa_event_data::assoc_reject
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_nl80211_event.c | 173 event.auth.status_code = le_to_host16(mgmt->u.auth.status_code); 229 status = le_to_host16(mgmt->u.assoc_resp.status_code); 239 event.assoc_reject.status_code = status; 276 u16 status_code; local 290 status_code = status ? nla_get_u16(status) : WLAN_STATUS_SUCCESS; 295 status_code, drv->ignore_next_local_disconnect); 301 if (cmd == NL80211_CMD_CONNECT && status_code != WLAN_STATUS_SUCCESS) { 324 event.assoc_reject.status_code = status_code; [all...] |
H A D | driver.h | 2852 * @status_code: Status Code or Reason Code to use (if needed) 2863 u8 dialog_token, u16 status_code, u32 peer_capab, 4373 u16 status_code; member in struct:wpa_event_data::auth_info 4406 * status_code - Status Code from (Re)association Response 4408 u16 status_code; member in struct:wpa_event_data::assoc_reject
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | tdls.c | 124 u16 status_code; member in struct:wpa_tdls_peer::tpk_timer 224 u16 status_code, u32 peer_capab, 228 status_code, peer_capab, initiator, buf, 234 u8 dialog_token, u16 status_code, u32 peer_capab, 240 "dialog_token=%u status_code=%u peer_capab=%u initiator=%d " 242 MAC2STR(dest), action_code, dialog_token, status_code, 246 status_code, peer_capab, initiator, msg, 284 peer->sm_tmr.status_code = status_code; 341 peer->sm_tmr.status_code, 222 wpa_tdls_send_tpk_msg(struct wpa_sm *sm, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument 233 wpa_tdls_tpk_send(struct wpa_sm *sm, const u8 *dest, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *msg, size_t msg_len) argument [all...] |
H A D | wpa.h | 58 u16 status_code, u32 peer_capab,
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | tdls.c | 124 u16 status_code; member in struct:wpa_tdls_peer::tpk_timer 224 u16 status_code, u32 peer_capab, 228 status_code, peer_capab, initiator, buf, 234 u8 dialog_token, u16 status_code, u32 peer_capab, 240 "dialog_token=%u status_code=%u peer_capab=%u initiator=%d " 242 MAC2STR(dest), action_code, dialog_token, status_code, 246 status_code, peer_capab, initiator, msg, 284 peer->sm_tmr.status_code = status_code; 341 peer->sm_tmr.status_code, 222 wpa_tdls_send_tpk_msg(struct wpa_sm *sm, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument 233 wpa_tdls_tpk_send(struct wpa_sm *sm, const u8 *dest, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *msg, size_t msg_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | tdls.c | 124 u16 status_code; member in struct:wpa_tdls_peer::tpk_timer 224 u16 status_code, u32 peer_capab, 228 status_code, peer_capab, initiator, buf, 234 u8 dialog_token, u16 status_code, u32 peer_capab, 240 "dialog_token=%u status_code=%u peer_capab=%u initiator=%d " 242 MAC2STR(dest), action_code, dialog_token, status_code, 246 status_code, peer_capab, initiator, msg, 284 peer->sm_tmr.status_code = status_code; 341 peer->sm_tmr.status_code, 222 wpa_tdls_send_tpk_msg(struct wpa_sm *sm, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument 233 wpa_tdls_tpk_send(struct wpa_sm *sm, const u8 *dest, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *msg, size_t msg_len) argument [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/apitools/apitools/base/py/ |
H A D | base_api.py | 558 if http_response.status_code not in (http_client.OK, 561 if http_response.status_code == http_client.NO_CONTENT:
|
/external/ipsec-tools/src/racoon/ |
H A D | gssapi.c | 76 gssapi_error(OM_uint32 status_code, const char *where, argument 90 maj_stat = gss_display_status(&min_stat, status_code,
|
/external/libmicrohttpd/src/testspdy/ |
H A D | test_notls.c | 375 spdylay_status_code status_code, 378 (void)status_code; 373 on_stream_close_callback(spdylay_session *session, int32_t stream_id, spdylay_status_code status_code, void *user_data) argument
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/cloudsearch2/ |
H A D | search.py | 345 return {'body': resp.content.decode('utf-8'), 'status_code': resp.status_code} 366 _status_code = r['status_code']
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/cloudsearch2/ |
H A D | test_search.py | 338 status_code = 405 variable in class:FakeResponse
|
/external/libweave/src/ |
H A D | device_registration_info.cc | 700 int status_code = response->GetStatusCode(); local 701 if (status_code == http::kDenied) { 708 if (status_code >= http::kInternalServerError) { 731 if (status_code == http::kForbidden &&
|
/external/google-breakpad/src/testing/gtest/src/ |
H A D | gtest-death-test.cc | 669 DWORD status_code; local 671 ::GetExitCodeProcess(child_handle_.Get(), &status_code) != FALSE); 673 set_status(static_cast<int>(status_code));
|
/external/gtest/src/ |
H A D | gtest-death-test.cc | 671 DWORD status_code; local 673 ::GetExitCodeProcess(child_handle_.Get(), &status_code) != FALSE); 675 set_status(static_cast<int>(status_code));
|
/external/llvm/utils/unittest/googletest/src/ |
H A D | gtest-death-test.cc | 633 DWORD status_code; local 635 ::GetExitCodeProcess(child_handle_.Get(), &status_code) != FALSE); 637 set_status(static_cast<int>(status_code));
|
/external/mesa3d/src/gtest/src/ |
H A D | gtest-death-test.cc | 631 DWORD status_code; local 633 ::GetExitCodeProcess(child_handle_.Get(), &status_code) != FALSE); 635 set_status(static_cast<int>(status_code));
|
/external/vulkan-validation-layers/tests/gtest-1.7.0/src/ |
H A D | gtest-death-test.cc | 671 DWORD status_code; local 673 ::GetExitCodeProcess(child_handle_.Get(), &status_code) != FALSE); 675 set_status(static_cast<int>(status_code));
|
/external/libmicrohttpd/src/microhttpd/ |
H A D | connection.c | 925 * @param status_code the response code to send (400, 413 or 414) 930 unsigned int status_code, 946 status_code, message); 952 MHD_queue_response (connection, status_code, response); 2874 * @param status_code HTTP status code (i.e. #MHD_HTTP_OK) 2882 unsigned int status_code, 2893 connection->responseCode = status_code; 929 transmit_error_response(struct MHD_Connection *connection, unsigned int status_code, const char *message) argument 2881 MHD_queue_response(struct MHD_Connection *connection, unsigned int status_code, struct MHD_Response *response) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | interworking.c | 127 u16 status_code) 132 " dialog_token=%u result=%d status_code=%u", 133 MAC2STR(dst), dialog_token, result, status_code); 135 status_code); 2936 const struct wpabuf *resp, u16 status_code) 2947 " dialog_token=%u result=%d status_code=%u", 2948 MAC2STR(dst), dialog_token, result, status_code); 3060 const struct wpabuf *resp, u16 status_code) 3066 " dialog_token=%d status_code=%d resp_len=%d", 3067 MAC2STR(addr), dialog_token, status_code, 122 interworking_anqp_resp_cb(void *ctx, const u8 *dst, u8 dialog_token, enum gas_query_result result, const struct wpabuf *adv_proto, const struct wpabuf *resp, u16 status_code) argument 2933 anqp_resp_cb(void *ctx, const u8 *dst, u8 dialog_token, enum gas_query_result result, const struct wpabuf *adv_proto, const struct wpabuf *resp, u16 status_code) argument 3057 gas_resp_cb(void *ctx, const u8 *addr, u8 dialog_token, enum gas_query_result result, const struct wpabuf *adv_proto, const struct wpabuf *resp, u16 status_code) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver.h | 2852 * @status_code: Status Code or Reason Code to use (if needed) 2863 u8 dialog_token, u16 status_code, u32 peer_capab, 4373 u16 status_code; member in struct:wpa_event_data::auth_info 4406 * status_code - Status Code from (Re)association Response 4408 u16 status_code; member in struct:wpa_event_data::assoc_reject
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/cloudsearch/ |
H A D | test_search.py | 392 status_code = 405 variable in class:FakeResponse
|
/external/libmicrohttpd/src/include/ |
H A D | microhttpd.h | 1815 * @param status_code HTTP status code (i.e. #MHD_HTTP_OK) 1823 unsigned int status_code,
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.h | 328 le16 status_code; member in struct:rsn_rdie
|